Chapter 1 Flashcards

1
Q
HTTP, IMAP4, FTP, and Telnet are all examples of protocols that operate at what layer of the OSI model?
A) Layer 4
B) Layer 5
C) Layer 6
D) Layer 7
A

D) Layer 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
What layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application?
A) Application Layer
B) Presentation Layer
C) Session Layer
D) Transport Layer
A

C) Session Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
What is the name of the protocol data unit (PDU) of the Data Link layer?
A) Packet
B) Data
C) Bit
D) Frame
A

D) Frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
The segment or datagram protocol data unit exists at what layer of the OSI model?
A) Application Layer
B) Transport Layer
C) Network Layer
D) Data Link Layer
A

B) Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
In what network topology are devices daisy-chained together in a single line?
A) Bus Topology
B) Star Topology
C) Star Bus Topology
D) Ring Topology
A

A) Bus Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
What physical network topology consists of all connected devices connecting to one central device, such as a switch?
A) Bus Topology
B) Ring Topology
C) Hub Topology
D) Star Topology
A

D) Star Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
The device where a telecommunications service provider network ends and an organization's network begins is referred to as what option below? 
A) Demarc
B) Last Mile
C) Local Loop
D) Point of No Return
A

A) Demarc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The proper handling procedures for substances such as chemical solvents are typically outlined in which of the following options?
A) Toxic Chemical Safety Procedure (TCSP)
B) Dangerous and Hazardous Waste Disposal Sheet (DHWDS)
C) Environmental Chemical Hazard Sheet (ECHS)
D) Material Safety Data Sheet (MSDS)

A

D) Material Safety Data Sheet (MSDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
An open electrical circuit as a result of a failed circuit breaker is considered to be what type of failure system?
A) Fail-open
B) Fail-close
C) Fail-tolerant
D) Fail-dynamic
A

B) Fail-close

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
A standard network switch operates at what layer of the OSI model?
A) Layer 5
B) Layer 2
C) Layer 3
D) Layer 7
A

B) Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is not one of the disadvantages of peer-to-peer networks?
A) They lack scalability
B) They are not necessarily secure
C) They are impractical for connecting large numbers of computers
D) They centralize user account logins

A

D) They centralize user account logins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Using the same network to deliver multiple types of communications services, such as video, voice, and fax is known as: 
A) Multi-faceted networking
B) Convergence
C) Multiplexing
D) Unified Networking
A

B) Convergence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
At what layer of the OSI model do the IP, ICMP, and ARP protocols operate?
A) Application
B) Session
C) Transport
D) Network
A

D) Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Select the layer of the OSI  model that is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read:
A) Application
B) Presentation
C) Session
D) Transport
A

B) Presentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
If a Network layer protocol is aware that a packet is larger than the maximum size for its network, it will divide the packet into smaller packets in a process known as:
A) De-encapsulation
B) Fragmentation
C) Packet Splitting
D) Framing
A

B) Fragmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
The process of adding a header to the data inherited from the layer above is called what option below?
A) Segmenting
B) Encapsulation
C) Fragmenting
D) Appending
A

B) Encapsulation

17
Q
When using a Windows domain, what is the domain-level account for each user known as?
A) Global Account
B) Universal Account
C) Domain Token
D) Principle Name
A

A) Global Account

18
Q
What mail protocol is used to send mail messages to a server?
A) POP3
B) IMAP4
C) SMTP
D) HTTPS
A

C) SMTP

19
Q
What is the name for a client-server model with one server and many clients, such as when an application is used to watch a live sports event?
A) Multicast Distribution
B) Multi-point Communication
C) Spread Packet Delivery
D) Broadcast Transmission
A

A) Multicast Distribution

20
Q
Any computer or device on a network that can be addressed on the local network is referred to as a:
A) Host
B) Node
C) Target
D) Subject
A

B) Node

21
Q
What are two encryption protocols commonly used with the Hypertext Transfer Protocol?
A) SSH
B) TLS
C) SSL
D) AES
A

B) TLS

C) SSL

22
Q
What two mail delivery protocols below can be used by a client application to receive e-mail from a server?
A) POP3
B) SMTP
C) MGET
D) IMAP4
A

A) POP3

D) IMAP4

23
Q
Which two protocols can be used to gain remote access specifically to a server's command line interface, securely an unsecurely?
A) Telnet
B) SSH
C) Remote Desktop
D) VNC
A

A) Telnet

B) SSH

24
Q
What are the two main Transport Layer protocols?
A) IPX
B) SPC
C) TCP
D) UDP
A

C) TCP

D) UDP

25
Q
Static electricity can cause what two types of damage in electronic components?
A) Electromagnetic Failure
B) Catastrophic Failure
C) Upset Failure
D) Polarity Failure
A

B) Catastrophic failure

C) Upset failure